Analysis
-
max time kernel
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:21
Behavioral task
behavioral1
Sample
反p2p终结者2012 增强绿色版/PC6官方下载.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
反p2p终结者2012 增强绿色版/PC6官方下载.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
反p2p终结者2012 增强绿色版/WinPcap_3_0.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
反p2p终结者2012 增强绿色版/WinPcap_3_0.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
反p2p终结者2012 增强绿色版/反p2p终结者2012增强版.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
反p2p终结者2012 增强绿色版/反p2p终结者2012增强版.exe
Resource
win10v2004-20231215-en
General
-
Target
反p2p终结者2012 增强绿色版/反p2p终结者2012增强版.exe
-
Size
62.6MB
-
MD5
5e6b1c5a450caebbc8a8e9cbd3f37723
-
SHA1
fe86b4566340b18fb61c4e6e89c8be94ec6fff00
-
SHA256
f73b0f38bd675deb45bdf2e0f15cf8b5729d5ef1f1c872da520f282ef3412170
-
SHA512
7a50a07004e48fe109aad99facaaa295aece2453db759d5ad5887e988693ebbca8e268a1aa53efa7259ffeea8574a6f926f8f87eef12273cd0182df2c8d5cb04
-
SSDEEP
24576:tXvrMJvSqd8nqX9vH84VT7YLlbDPU16duTPTKWJ/wQ0e:tYJKLnKCDPU8c7KWJE
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10015828-A707-22d2-9CBD-0000F87A469H}\StubPath = "C:\\Program Files\\Common Files\\Microsoft Shared\\bbs\\bbs\\bbs.exe" 反p2p终结者2012增强版.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10015828-A707-22d2-9CBD-0000F87A469H} 反p2p终结者2012增强版.exe -
Executes dropped EXE 1 IoCs
pid Process 1104 forumdisp.exe -
Loads dropped DLL 2 IoCs
pid Process 2824 反p2p终结者2012增强版.exe 2824 反p2p终结者2012增强版.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\forumdisp.exe 反p2p终结者2012增强版.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\xinzhu.txt 反p2p终结者2012增强版.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\bbs\bbs\bbs.exe 反p2p终结者2012增强版.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\kkk.txt 反p2p终结者2012增强版.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\IEFILES5.INI 反p2p终结者2012增强版.exe File created C:\Program Files\Common Files\a2.txt 反p2p终结者2012增强版.exe File created C:\Program Files\Common Files\Microsoft Shared\bbs\bbs\bbs.exe 反p2p终结者2012增强版.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\bbs\ 反p2p终结者2012增强版.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\bbs\bbs 反p2p终结者2012增强版.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared 反p2p终结者2012增强版.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\ntfs.bat 反p2p终结者2012增强版.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2824 反p2p终结者2012增强版.exe 2824 反p2p终结者2012增强版.exe 2824 反p2p终结者2012增强版.exe 2824 反p2p终结者2012增强版.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1104 2824 反p2p终结者2012增强版.exe 21 PID 2824 wrote to memory of 1104 2824 反p2p终结者2012增强版.exe 21 PID 2824 wrote to memory of 1104 2824 反p2p终结者2012增强版.exe 21 PID 2824 wrote to memory of 1104 2824 反p2p终结者2012增强版.exe 21 PID 2824 wrote to memory of 2712 2824 反p2p终结者2012增强版.exe 29 PID 2824 wrote to memory of 2712 2824 反p2p终结者2012增强版.exe 29 PID 2824 wrote to memory of 2712 2824 反p2p终结者2012增强版.exe 29 PID 2824 wrote to memory of 2712 2824 反p2p终结者2012增强版.exe 29 PID 2712 wrote to memory of 2548 2712 cmd.exe 31 PID 2712 wrote to memory of 2548 2712 cmd.exe 31 PID 2712 wrote to memory of 2548 2712 cmd.exe 31 PID 2712 wrote to memory of 2548 2712 cmd.exe 31 PID 2712 wrote to memory of 2836 2712 cmd.exe 32 PID 2712 wrote to memory of 2836 2712 cmd.exe 32 PID 2712 wrote to memory of 2836 2712 cmd.exe 32 PID 2712 wrote to memory of 2836 2712 cmd.exe 32
Processes
-
C:\Program Files\forumdisp.exe"C:\Program Files\forumdisp.exe"1⤵
- Executes dropped EXE
PID:1104
-
C:\Users\Admin\AppData\Local\Temp\反p2p终结者2012 增强绿色版\反p2p终结者2012增强版.exe"C:\Users\Admin\AppData\Local\Temp\反p2p终结者2012 增强绿色版\反p2p终结者2012增强版.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSInfo\ntfs.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\bbs\bbs /d everyone /e3⤵PID:2548
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\bbs" /d everyone /e3⤵PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b44c83aaaf9e52252f0340785c772faa
SHA138026ca434497b3f08464ae1d46091089ad2b564
SHA2569789a949da0e8c27ddfa08f7ef2f5c0cbb0efad12260bd4c43b7eba87c3e5b04
SHA5125201d560c037f474201d43bd9bf5aa8dd654d7767bba65407277e7643d37d1fe8425977d911f420e8c40d16c9eefb4cdbdef07f872480492b8a9c9a9015a9a98
-
Filesize
48KB
MD55f389284162d3a98eae873fbb87704c8
SHA148acf6ca71c54eb6080bb66a8380c335184ba685
SHA2566608e72a9c22d52f6551d49e5efe234a8341f5cea3756dfec3aa95427f878cc2
SHA5121c21c05550f1ebb670fe5893d00c82c6220ad9bc197e64b132683793cceedff8cf918ff6b9a3815437e43fb63bc730f633eb03dbd0652c11410847b589b40cc8
-
Filesize
27KB
MD5e703257bf8e6ef9b71549b7c6ddb0d4e
SHA162da16cfa2b19aa763dceca75d31d8928bae9d8f
SHA256af39a29252f1a8d4a9fbc7b6412eebea5b458e57ec64b4c3d1c3e17e3aeda3ef
SHA5121977d630c78da48098110d30f6a614cf1745c474951db1adbea062d65ab45032bc31b3ddae55a0f5bc9c2fef88906b53c677edc3de98c6d48d87a52721da2ed6
-
Filesize
5KB
MD5aad8577d05092d52367d2b03d2cd1ce4
SHA1699c724d1937d0639df30dfb16d6e4efe92eedf5
SHA25623461bfd949a4c7f3c719427ea41512438d43681f324d74b9530a2ffac5d0a85
SHA512071be026b8e5af07fc3feb8964a39a12bc496f0bdf1b2abf9acd333fb802cebc1db8160499b906a3ffc3ffffd1b3f308b28c17c64fd5b9a903aaa0ebe6154acd